The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest.
References
Link | Resource |
---|---|
https://www.cirosec.de/sa/sa-2024-012 |
Configurations
No configuration.
History
19 Feb 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest. |
17 Feb 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-17 12:15
Updated : 2025-02-19 09:15
NVD link : CVE-2025-0714
Mitre link : CVE-2025-0714
CVE.ORG link : CVE-2025-0714
JSON object : View
Products Affected
No product.
CWE
CWE-1204
Generation of Weak Initialization Vector (IV)